Cloud security risks, and rewards: Leviathan Security today released reports on whether it's more or less secure than local storage, if data can be kept available and confidential, and whether companies can adequately hire to secure their data.
Staying on top of the latest in software/hardware security research, vulnerabilities, threats and computer attacks.
Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of security. He is the author of three books and thousands of published articles and many more unpublished, private reports. Larry has been Technical Director at several test laboratories where he both directed and ran product testing, with a special interest in test automation. Larry began his career as a Software Engineer at the now-defunct Desktop Software Corporation in Princeton, NJ, on the team that wrote the NPL 4GL query language. He also worked on corporate IT and software development at Chase Econometrics. Larry is a graduate of the University of Pennsylvania with a degree in Public Policy.
Ms. Violet Blue (tinynibbles.com, @violetblue) is a freelance investigative reporter on hacking and cybercrime at Zero Day/ZDNet, CNET and CBS News, as well as a noted sex columnist. She has made regular appearances on CNN and The Oprah Winfrey Show and is regularly interviewed, quoted, and featured in a variety of publications that includes ABC News and the Wall Street Journal. She has authored and edited award-winning, best selling books in eight translations and has been a sex columnist for the San Francisco Chronicle. She has given keynote talks at such conferences as ETech, LeWeb, and the Forbes Brand Leadership Conference, and has given two Tech Talks at Google. In 2010, the London Times named Blue one of “40 bloggers who really count.” Ms. Blue is the author of The Smart Girl's Guide to Privacy. Violet Blue bio courtesy of TTI Vanguard.
The majority of dating apps have serious security vulnerabilities that put user data at risk. And because people are online dating at work, those risks are passed onto their employer.
The Obama administration wants all corners of government to be on the same page when a cyberattack strikes. The new center will help create a "seamless" intelligence stream.
As we seek new security solutions, what should app developers working in the burgeoning field of biometric security keep in mind?
Bitcoin exchange MyCoin has vanished -- leaving up to $387 million in investor funds unaccounted for.
It's nasty, but you don't have to be held to ransom by it.
The hacktivist collective has targeted and taken down hundreds of social media accounts belonging to the extremist group ISIS.
Were millions of records stolen from the healthcare insurance provider encrypted?
A collection of notable security news items for the week ending February 6, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Sony's Amy Pascal has resigned as co-chair of the company following a disastrous cyberattack which cost the company dearly both financially and in reputation.
The social media giant has pledged thousands to assist in the development of the open-source security project.
Anthem's hack and issues around organization accountability with PII is cause to protect ourselves from identity theft and more, including security freeze, fraud alert, and account recovery.
More than half-a-million WordPress users of a Fancybox plugin may be affected, security researchers say, though the exact figure is unknown.
The second largest health insurer in the US has been the victim of what could be the largest data breach in the healthcare sector to date.
Microsoft has granted HP security researchers a hefty bug bounty for demonstrating Internet Explorer flaws -- days after a vicious XSS vulnerability was disclosed online.
The best of ZDNet, delivered
- 1 The top ten most common database security vulnerabilities
- 2 Yes, the FBI and CIA can read your email. Here's how
- 3 Symantec releases simplified Norton Security line
- 4 Six clicks: How hackers use employees to break through security walls
- 5 Google.com now 'censors' explicit content from image searches